Eat yourself up before someone else eats you. Proving this adage right we have done this rough research on being anonymous online. I doubt anyone can be more silent than this. Read out to find out. If you still get knocked then hard luck.

Thankx...Presentation is for just overview if someone nt interested to read whole document then he or she will read presentation if he or she want to take interest in that then...the whole paper is available for them...

Cons first so we end on a good note:- There doesn't seem to be a set target audience. For 80% of the document it is clear that the reader should already know some of the basics. For example; some terminology was used without explanation as to what it was, assuming that the reader already has an idea of what is being presented. Which in a way is nice. However, that should probably be stated in the introduction. As for the other 20% I got the impression of the complete opposite. It was as if reading a seriously presented topic then out of nowhere there were these comments that gave it a 'high school skiddie' feel with some dummy explanations.- Remove the vulgarity.- Section X. Alternate Device Connection. No! No! No! Just after comprehensively covering VPNs it goes right into using your neighbors network as "the best way to hide your ass" No!- Physical destruction of devices really doesn't need an entire section with pictures. Just reference it and maybe a couple of methods is all that is needed to cover that.- The last fourth of the document or so felt rushed and got a little sloppy.

Pros:- Despite the cons there was clearly an exuberant amount of research done! To me this is the most important part and because of this, this document is entirely worth the read. I took a lot of notes while going over it and personally gave me some items that I need to conduct some of my own research on.- +1 for covering Google Tracking that well- +1 for referencing Darik's Boot and Nuke- Sources/Tools were listed and linked to original host locations for safe downloading.- Despite English not being the primary language of the author it was written well enough to overlook any grammar mistakes.

Conclusion:I think the document needs some revision and rewritten for better organization and flow. Still a great read due to the amount of information presented! Again the research that went into writing this impressed me. That being said, even with the fairly long list of complaints I still have to give it a high rating.8/10

"The quieter you become, the more you are able to hear...""Drink all the booze, hack all the things."

Here is a collection of my all 8 quality articles and a youtube channel

= Titles =

1.Stealth Doxing2.Encryption Methodology3.World Website Structures & Common Admin Panels with default attacks4.Exploiting "SQL Injection Attack" = This is nt about how to exploit with SQL injection.Its about how to prevent SQL injection with common inbuilt PHP function 5.How to be anonymous Onnline - Paper6.How to be anonymous online - Presentation7.The inside story - War between Google vs Yahoo Vs Facebook8.Why exploit scanner is not helpful to us